Table of Contents
Vol 2, No 6 (2010)
Open Access
Subscription Access
Articles
A Delay Aware Tree Based Technique in Wireless Sensor Network | ||
V. Cibi Castro, R. Rajesh | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 391 | PDF Views: 2 |
Restoring Internodes Connectivity in Networks of Moveable Sensors | ||
R. AnbuRajan | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 221 | PDF Views: 4 |
A Detailed Study on Cloud Computing Based on Security and Future Opportunities | ||
A. Rajadurai, J. Ilanchezhian, V. Varadharassu, A. Ranjeeth | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 347 | PDF Views: 2 |
Secure Data Transmission in Wireless Sensor Network Using Randomized Multipath Routes | ||
K. Soundar Rajan | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 246 | PDF Views: 3 |
Design of Reconfigurable 2-D W/T OCDMA Decoder for Access Networks | ||
M. Bala Subramanian, Prita Nair | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 215 | PDF Views: 3 |
Design of a Wireless Sensor Network Node Based on nRF2401 | ||
B. Thulasiram, P. Pandiaraj | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 223 | PDF Views: 3 |
Transaction Processing System for Efficient Maintenance of Databases in Cloud | ||
S. Bala Manohari, R. Sasikala | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 234 | PDF Views: 3 |
Providing Security to Wireless Sensor Networks by Identifying and Preventing Malicious Node | ||
A. Asha Joshia, I. Shahanaz Begumb | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 235 | PDF Views: 3 |